CICI Regional: SouthEast SciEntific Cybersecurity for University Research (SouthEast SECURE) Clemson University: Jill Gemmill University of Tennessee-Chattanooga: Tony Skjellum University of Alabama at Huntsville: Sara Graves Voorhees College: Veronical Gadsden Jackson State University: Richard Alo
The Program Survey NSF funded investigators in the SouthEast Provide Cybersecurity Metrics Student-built devices University web site SSL/TLS security & patch speed over time Facilitate communication between research faculty and university IT/Data Security staff. Provide practical assistance On-campus or individual training Downsize great CTSC materials Create engaging content for domain scientists
Some features of the SouthEast New NSF awards in FY14. A total of 579 institutions received funding that year; of these, 47 were HBCUs, 5 were Minority Serving Institutions, and 8 were Hispanic minority serving institutions.
What help with cybersecurity do NSF-PIs need? - SURVEY (anonymous) 707 Responses 10-18% response rate
Who Answered Survey?
Who Answered Survey?
What kind of information technology (IT) systems does your NSF project use (computers, servers, network connected instrumentation, etc.)? Check all.
Which of the following "cloud" services is your project using Which of the following "cloud" services is your project using? Check all that apply.
Who maintains your IT systems to keep them in working order Who maintains your IT systems to keep them in working order? Check all that apply.
Where do your NSF project cyber security requirements come from Where do your NSF project cyber security requirements come from? Check all that apply.
Do you (or your team) create your own websites or write your own software/software modules?
“not sure”; “haven’t thought about it” How does cyber security impact your current NSF projects? Select the response that most closely matches your opinion. “not sure”; “haven’t thought about it”
What kinds of cyber attacks have impacted your NSF project What kinds of cyber attacks have impacted your NSF project? Check all that apply.
Please contact me at the email address above about:
Does your cybersecurity training look like this?
What is CyberSecurity? Cybersecurity is the protection of data and computer systems from illicit access or acquisition of equipment, software, and / or data.
Important Facts 91% of cyberattacks start with email Ransomware: software that can encrypt and lock your assess to that data Insider threats are a major concern Intellectual Property (IP) theft can be expensive and can affect your professional career NSF is concerned about cybersecurity and privacy protection
What might be more effective
Collaborative Research: CICI: Regional: SouthEast SciEntific Cybersecurity for University Research (SouthEast SECURE) - Jill Gemmill (PI) This material is based upon work supported by the National Science Foundation under Grants No. 1642102; 1642083; 1642069; and 1642038. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation.
Questions & Discussion Contact Jill Gemmill jbg@clemson.edu